<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.stream.security/2-pager</loc>
    </url>
    <url>
        <loc>https://www.stream.security/about</loc>
    </url>
    <url>
        <loc>https://www.stream.security/thank-you/agile-cloud-ty-01</loc>
    </url>
    <url>
        <loc>https://www.stream.security/aws</loc>
    </url>
    <url>
        <loc>https://www.stream.security/customers/better-therapeutics</loc>
    </url>
    <url>
        <loc>https://www.stream.security/blog</loc>
    </url>
    <url>
        <loc>https://www.stream.security/customers/bob</loc>
    </url>
    <url>
        <loc>https://www.stream.security/book-demo</loc>
    </url>
    <url>
        <loc>https://www.stream.security/chrome-extension</loc>
    </url>
    <url>
        <loc>https://www.stream.security/contact-us</loc>
    </url>
    <url>
        <loc>https://www.stream.security/customers-home</loc>
    </url>
    <url>
        <loc>https://www.stream.security/whitepapers/efficient-cloud-security-e-book</loc>
    </url>
    <url>
        <loc>https://www.stream.security/event</loc>
    </url>
    <url>
        <loc>https://www.stream.security/landing/guide-to-cloud-change-intelligence-cci</loc>
    </url>
    <url>
        <loc>https://www.stream.security/wiki/home</loc>
    </url>
    <url>
        <loc>https://www.stream.security/customers/industrial-scientific</loc>
    </url>
    <url>
        <loc>https://www.stream.security/k8s</loc>
    </url>
    <url>
        <loc>https://www.stream.security/customers/kaltura</loc>
    </url>
    <url>
        <loc>https://www.stream.security/lightlytics-copyright-policy</loc>
    </url>
    <url>
        <loc>https://www.stream.security/customers/neuron</loc>
    </url>
    <url>
        <loc>https://www.stream.security/partners</loc>
    </url>
    <url>
        <loc>https://www.stream.security/press</loc>
    </url>
    <url>
        <loc>https://www.stream.security/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.stream.security/proof-of-concept-agreement</loc>
    </url>
    <url>
        <loc>https://www.stream.security/customers/ringcentral</loc>
    </url>
    <url>
        <loc>https://www.stream.security/thank-you/submission-successful</loc>
    </url>
    <url>
        <loc>https://www.stream.security/terms</loc>
    </url>
    <url>
        <loc>https://www.stream.security/terms-of-use</loc>
    </url>
    <url>
        <loc>https://www.stream.security/thank-you/treemium-submission</loc>
    </url>
    <url>
        <loc>https://www.stream.security/trial-agreement</loc>
    </url>
    <url>
        <loc>https://www.stream.security/customers/wego</loc>
    </url>
    <url>
        <loc>https://www.stream.security/white-papers</loc>
    </url>
    <url>
        <loc>https://www.stream.security/whitepapers/generative-ai-well-architected-aws-and-stream-security---better-together</loc>
    </url>
    <url>
        <loc>https://www.stream.security/whitepapers/5-pitfalls-for-cnapp-users</loc>
    </url>
    <url>
        <loc>https://www.stream.security/whitepapers/cdr-essentials-wp</loc>
    </url>
    <url>
        <loc>https://www.stream.security/whitepapers/cnapp-a-strong-foundation-with-critical-gaps-how-to-bridge-them</loc>
    </url>
    <url>
        <loc>https://www.stream.security/gloassary</loc>
    </url>
    <url>
        <loc>https://www.stream.security/whitepapers/stream-security-aws-inspector</loc>
    </url>
    <url>
        <loc>https://www.stream.security/customers/shield</loc>
    </url>
    <url>
        <loc>https://www.stream.security/gartner-cool-vendor</loc>
    </url>
    <url>
        <loc>https://www.stream.security/use-cases/investigate</loc>
    </url>
    <url>
        <loc>https://www.stream.security/use-cases/detect</loc>
    </url>
    <url>
        <loc>https://www.stream.security/use-cases/respond</loc>
    </url>
    <url>
        <loc>https://www.stream.security/integrations</loc>
    </url>
    <url>
        <loc>https://www.stream.security/soc-museum</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rsac-2025</loc>
    </url>
    <url>
        <loc>https://www.stream.security/invite-only</loc>
    </url>
    <url>
        <loc>https://www.stream.security/cloud-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.stream.security/real-time-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.stream.security/careers</loc>
    </url>
    <url>
        <loc>https://www.stream.security/know-your-cloud-quiz</loc>
    </url>
    <url>
        <loc>https://www.stream.security</loc>
    </url>
    <url>
        <loc>https://www.stream.security/use-cases/fuse</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rsac-2026</loc>
    </url>
    <url>
        <loc>https://www.stream.security/customers/hunt-energy-stream-security</loc>
    </url>
    <url>
        <loc>https://www.stream.security/compliance/apra</loc>
    </url>
    <url>
        <loc>https://www.stream.security/compliance/aws-foundational-security-best-practices-controls</loc>
    </url>
    <url>
        <loc>https://www.stream.security/compliance/aws-well-architected-framework</loc>
    </url>
    <url>
        <loc>https://www.stream.security/compliance/ccpa</loc>
    </url>
    <url>
        <loc>https://www.stream.security/compliance/cis</loc>
    </url>
    <url>
        <loc>https://www.stream.security/compliance/cis-8</loc>
    </url>
    <url>
        <loc>https://www.stream.security/compliance/cis-eks</loc>
    </url>
    <url>
        <loc>https://www.stream.security/compliance/cisawsf</loc>
    </url>
    <url>
        <loc>https://www.stream.security/compliance/csa-ccm</loc>
    </url>
    <url>
        <loc>https://www.stream.security/compliance/fedramp</loc>
    </url>
    <url>
        <loc>https://www.stream.security/compliance/ftr</loc>
    </url>
    <url>
        <loc>https://www.stream.security/compliance/gdpr</loc>
    </url>
    <url>
        <loc>https://www.stream.security/compliance/hipaa</loc>
    </url>
    <url>
        <loc>https://www.stream.security/compliance/hitrust</loc>
    </url>
    <url>
        <loc>https://www.stream.security/compliance/iso-27001</loc>
    </url>
    <url>
        <loc>https://www.stream.security/compliance/iso-27701</loc>
    </url>
    <url>
        <loc>https://www.stream.security/compliance/mas</loc>
    </url>
    <url>
        <loc>https://www.stream.security/compliance/nist-800-53</loc>
    </url>
    <url>
        <loc>https://www.stream.security/compliance/nist4</loc>
    </url>
    <url>
        <loc>https://www.stream.security/compliance/pci</loc>
    </url>
    <url>
        <loc>https://www.stream.security/compliance/soc2</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules-categories/availability</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules-categories/cost</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules-categories/other</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules-categories/security</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules-categories/threat-detection</loc>
    </url>
    <url>
        <loc>https://www.stream.security/ty/10-min-w-gideon</loc>
    </url>
    <url>
        <loc>https://www.stream.security/ty/webinar-kill-chain-series-cloud-attack-vectors-mitigation</loc>
    </url>
    <url>
        <loc>https://www.stream.security/ty/wp-overwhelmed-cloud-security-team</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/active-directory</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/aks</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/alb</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/ami</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/api-gateway</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/app-service-plan</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/athena</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/auto-scaling-group</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/availability-zone</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/aws-bedrock</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/azure-openai</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/blob-storage</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/bot</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/cache-for-redis</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/cdn-profile</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/cloudformation-stack</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/cloudfront</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/cloudtrail</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/cloudwatch</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/config</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/cosmos-db</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/daemonset</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/data-lake-storage</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/deployment</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/direct-connect</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/direct-connect-gateway</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/disk-storage</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/dms</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/documentdb</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/domain-service</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/dynamodb</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/ebs-snapshots</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/ebs-volume</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/ec2</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/ecs</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/ecs-task-definition</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/efs</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/eks</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/elastic-ip</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/elasticache</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/elb</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/emr</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/endpoints</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/eni</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/files</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/firewall</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/firewall-policy</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/firewall-policy-rule-collection-group</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/front-door</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/function-app</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/glb</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/glue</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/group</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/guardduty</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/iam-account-password-policy</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/iam-group</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/iam-policy</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/iam-role</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/iam-user</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/image</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/ingress</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/instance-profile</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/internet-gateway</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/kinesis</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/kms</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/lambda-function</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/mq</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/msk</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/namespace</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/nat-gateway</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/network-acl</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/network-interface</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/network-policy</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/network-security-group</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/nlb</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/opensearch</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/pod</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/postgresql</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/prefix-list</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/queue-storage</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/rds</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/redshift</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/region</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/replicaset</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/resource-group</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/role-definition</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/route-53</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/route-table</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/route-table-azure</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/s3-bucket</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/s3-glacier</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/sagemaker-notebook</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/scp</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/security-group</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/service</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/service-account</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/ses</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/site-to-site-vpn-connection</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/snapshot</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/sns</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/sql-database</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/sql-server</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/sqs</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/statefulset</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/storage-account</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/subnet</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/subnet-azure</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/target-group</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/transit-gateway</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/user</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/virtual-machine</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/virtual-network</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/virtual-private-gateway</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/vpc</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/vpc-endpoint</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/vpc-peering</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/vpn-customer-gateway</loc>
    </url>
    <url>
        <loc>https://www.stream.security/resources/waf</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/10-best-practices-to-reduce-aws-ec2-costs</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/10-best-practices-to-reduce-your-aws-rds-costs</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/9-best-practices-to-reduce-your-aws-msk-apache-kafka-costs</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/a-comprehensive-solution-for-agile-and-real-time-security-operations-without-agents</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/a-layered-approach-to-reducing-false-positives-in-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/announcing-lightlytics-integration-with-atlantis</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/announcing-stream-traps-delay-threat-actors-to-detect-and-respond-more-effectively</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/architecting-cloud-resilience-options-and-trade-offs-for-aws</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/architectural-standards-blog</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/aws-access-analyzer-vs-lightlytics-discovery</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/aws-budgets</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/aws-config-for-compliance</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/aws-cost-anomaly-detection-identify-and-address-cost-spikes</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/aws-cost-best-practices-for-data-transfer</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/aws-cost-best-practices-for-ebs</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/aws-cost-best-practices-for-ec2</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/aws-cost-best-practices-for-eks</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/aws-cost-best-practices-for-msk</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/aws-cost-best-practices-for-opensearch</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/aws-cost-best-practices-for-rds</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/aws-cost-explorer</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/aws-cur-cost-usage-report-explained</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/aws-detective-for-security-investigation</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/aws-guardduty-for-threat-detection</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/aws-inspector-for-vulnerability-and-image-scanning</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/aws-trusted-advisor</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/aws-well-architected-framework</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/aws-well-architected-framework---cost-pillar</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/aws-well-architected-framework-cost-optimization</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/aws-well-architected-framework-operational-excellence</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/aws-well-architected-framework-performance-efficiency</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/aws-well-architected-framework-reliability</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/aws-well-architected-framework-security</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/aws-well-architected-framework-sustainability</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/be-proactive-about-your-nines</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/before-security-can-use-more-ai-it-needs-a-model-of-reality</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/beyond-the-booth-why-cybersecurity-needs-more-imagination</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/birth-of-the-cool-bringing-cloud-context-to-secops-teams</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/canaries-the-force-multiplier-for-early-intrusion-detection</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/cdrgoat-scenario-2-web-vuln-to-full-account-takeover-via-ssm-iam</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/closing-the-cloud-perimeter-gap-with-fortinet-ngfw-stream</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/closing-the-gap-how-automated-ai-triage-transforms-cloud-saas-secops</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/cloud-identity-network-segmentation-shrinking-the-breach-blast-radius</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/cloud-infrastructure-entitlement-management-ciem-explained</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/cloud-investigation-and-response-automation-cira</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/cloud-native-application-protection-platforms-cnapp</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/cloud-security-posture-management-cspm-explained</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/cloud-threat-detection-using-the-mitre-att-ck-framework</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/cloud-workload-protection-platform-cwpp</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/cloudtwin-hands-on-2-troubleshoot-aws-lambda-invocation-issues-with-lightlytics-discovery</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/cloudtwin-hands-on-introduction</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/common-iam-issues-and-solutions-for-aws-eks</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/complement-dont-consolidate-bringing-cloud-context-to-your-existing-tech-stack</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/continuous-threat-exposure-management-ctem</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/cracking-the-code-unveiling-streams-journey-to-solve-cloud-complexity</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/cross-account-permissions-management</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/cve-2026-31431-how-copy-fail-behaves-in-kubernetes</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/dbir-2025-reveals-everyones-hardening-the-cloud-but-thats-not-where-the-real-security-gap-is</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/delayed-visibility-puts-your-cloud-at-risk-its-time-for-real-time</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/democratize-cloud-costs-what-does-it-mean</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/enriching-real-time-cloud-detection-response-with-workload-observability-a-vendor-agnostic-approach</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/every-cloud-has-a-silver-r-o-i</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/faster-better-using-data-to-make-your-ai-soc-shine</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/from-playground-to-production-detecting-entragoat-scenarios-with-stream</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/from-shadow-ai-to-complete-visibility-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/from-siem-to-stream</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/from-tesla-to-nvidia-digital-twins-are-a-complexity-solver</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/getting-started-with-streams-cdrgoat</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/github-action-supply-chain-attack-exposes-secrets-what-you-need-to-know-and-how-to-respond</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/got-a-new-release-or-feature-to-deploy-you-need-a-great-strategy</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/hands-on-guide-how-to-find-and-remove-orphaned-ebs-snapshots</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/hands-on-guide-how-to-find-and-remove-unattached-elastic-ips</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/hands-on-guide-how-to-migrate-from-gp2-to-gp3-volumes</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/hands-on-guide-how-to-troubleshoot-and-optimize-aws-nat-gateway-to-reduce-cost</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/harmonizing-security-and-devops-navigating-the-cloud-environment</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/how-to-deploy-sysdig-falco-on-an-eks-cluster</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/how-to-deploy-tetragon-on-an-eks-cluster</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/how-to-find-idle-aws-resources-to-reduce-cost</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/how-to-identify-a-compromised-ec2-instance-using-vpc-flow-logs-and-amazon-guardduty</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/how-to-manage-kubernetes-secrets-on-aws-eks</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/how-to-outpace-the-adversary-with-stream-security</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/how-to-test-terraform-infrastructure-code</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/https-www-lightlytics-com-post-cloud-complexity-solved</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/iam-best-practices-and-troubleshooting-tips-for-aws-eks</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/iam-guide-kubernetes-on-aws</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/if-your-cloud-could-talk-introducing-security-with-mcp</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/import-existing-infrastructure-to-terraform</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/infrastructure-as-code-testing-strategies</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/infrastructure-as-code-the-foundation-of-effective-devops</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/introducing-aws-cost-troubleshooting-for-devops-teams</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/introducing-lightlytics-deploy-run-cloud-infrastructure-with-confidence</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/introducing-new-integration-with-github-audit-logs-for-advanced-threat-detection</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/invisible-kubernetes-rec-why-nodes-proxy-get-is-more-dangerous-than-you-think</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/kubernetes-cost-management-101</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/kubernetes-network-policies-101</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/kubernetes-support</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/lessons-hopefully-learned-from-awss-latest-outage</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/lightlytics-30m-series-a-fundraising-round</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/lightlytics-run-tasks-integration</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/metadata-injection-the-hidden-ttp-attackers-might-use-to-fool-your-ai-triage-investigation</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/mitre-attck-for-aws-understanding-tactics-detection-and-mitigation</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/moving-beyond-static-rules-and-algorithms</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/my-next-mission-bridging-the-cloud-security-gap-as-stream-securitys-field-ciso</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/no-files-no-trace-think-again-detecting-fileless-attacks-in-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/no-more-cloud-kabuki-unmasking-false-negatives-in-the-cloud-with-real-time-firewall-context</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/no-stress-deployment-with-a-digital-cloud-twin</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/periodic-scans-vs-real-time-change-impact-analysis</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/predict-the-cloud-butterfly-effect-introducing-stream-guided-response</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/protecting-security-baselines-with-aws-service-control-policies</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/pull-request-automation-using-terraform-cloud</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/re-solve-your-cloud-complexity-with-lightlytics-at-re-invent</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/resolve-common-eks-cluster-autoscaler-problems</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/saas-sourced-threat-detections-enhancing-cloud-visibility-and-precision-response</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/shift-left</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/still-using-siem-for-cloud-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/stream-cdrgoat-real-world-attack-simulations-for-threat-detection-readiness</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/stream-security-events-vs-aws-config</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/stream-security-expands-beyond-cloud-native-full-hybrid-cloud-visibility-with-vmware-nsx-and-on-prem-network-support</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/stream-security-now-supports-mongodb-atlas-log-ingestion-for-comprehensive-cloud-threat-detection</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/stream-security-now-supports-openai-platform-audit-log-ingestion-for-comprehensive-ai-control-plane-threat-detection</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/stream-security-secures-30-million-in-funding</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/stream-x-microsoft-365-smarter-saas-aware-threat-detection</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/stream-x-salesforce-advanced-threat-detection-to-stop-the-next-drift-style-breach</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/stream-x-snowflake-extending-detection-to-dbaas</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/streamline-integration-program</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/streamline-your-cloud-data-security-and-governance-with-stream-security-and-aws-macie</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/streamsecurity-achieves-aws-security-competency-status</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/switch-to-aws-graviton-to-reduce-rds-costs</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/teampcps-litellm-takeover-a-cascading-supply-chain-attack-across-five-ecosystems</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/terraform-ide-plugins</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/terraform-pull-request-automation-using-atlantis</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/terraform-pull-request-automation-using-bitbucket</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/terraform-pull-request-automation-using-env0</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/terraform-pull-request-automation-using-github-actions</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/terraform-pull-request-automation-using-gitlab-pipelines</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/terraform-pull-request-automation-using-jenkins</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/terraform-pull-request-automation-using-scalr</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/terraform-pull-request-automation-using-spacelift</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/terraform-tagging-strategies-and-cost-estimation-tools</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/the-6-pillars-of-the-aws-well-architected-framework</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/the-burnout-battlefield-what-ive-learned-about-protecting-soc-analysts-and-my-company</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/the-evolution-of-containers-kubecon-2022</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/the-hidden-costs-of-your-cloud-business</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/the-hidden-fragility-of-autonomous-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/the-imperative-for-cdr-cloud-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/the-momentum-of-cdr---insights-from-leaders-in-the-field</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/the-rise-of-real-time-exposure-detection</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/the-secops-reality-detection-triage-is-broken-when-it-comes-to-cloud</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/the-shai-hulud-2-0-npm-worm-what-happened-how-stream-detected-it</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/time-to-get-real-time-why-you-should-consider-alternatives-to-wiz-google</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/toxic-combination-real-time-agents-on-top-static-cspm</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/troubleshoot-and-optimize-aws-cross-az-traffic</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/troubleshoot-aws-reachability-issues-with-vpc-flow-logs</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/troubleshooting-guide-amazon-eks-networking</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/turning-the-tables-on-threat-actors-webinar-insights</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/uncovering-hidden-data-risks-with-aws-macie-sensitive-data-scanner</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/we-asked-you-answered-and-were-listening-stream-security-scores-a-96-in-customer-satisfaction</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/what-is-cadr-cloud-application-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/what-is-cloud-context-exploring-the-missing-layer-in-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/why-cloud-security-tools-have-so-many-false-positives</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/why-crowdstrikes-cdr-announcement-solves-the-wrong-problem-faster</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/you-cant-respond-at-cloud-speed-without-seeing-in-real-time-why-full-cloud-visibility-is-key-to-incident-response</loc>
    </url>
    <url>
        <loc>https://www.stream.security/post/your-siem-sees-the-logs-it-misses-the-risk</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/access-allowed-from-vpn</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ami-amazon-machine-images-not-in-use</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ami-amazon-machine-images-not-in-use-12-months</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/auto-scaling-group-not-in-use</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/aws-config-configuration-changes-alarm</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/aws-dynamodb-table-export</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/aws-ec2-vm-export-failure</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/aws-iam-activity-using-s3-browser-utility</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/aws-iam-user-created-access-keys</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/aws-rds-snapshot-export-to-s3</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/azure-ad-privileged-role-changes</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/azure-entraid-reset-password-for-global-admin-user</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/cloudtrail-changes-alarm</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/connections-towards-dynamodb-should-be-via-vpc-endpoints</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/connections-towards-s3-should-be-via-vpc-endpoint-9</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/container-escape-detection</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/container-in-crashloopbackoff-state</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/cross-peering-connectivity-is-allowed-by-ec2</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/cross-peering-connectivity-is-allowed-by-ecs-task</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/cross-peering-connectivity-is-allowed-by-lambda</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/cross-peering-connectivity-is-allowed-by-pod</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/cross-transit-connectivity-is-allowed-by-ec2</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/cross-transit-connectivity-is-allowed-by-ecs</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/cross-transit-connectivity-is-allowed-by-lambda</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/cross-transit-connectivity-is-allowed-by-pod</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/dynamodb-tables-not-in-use</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ebs-snapshots-not-in-use</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ebs-volume-not-in-use</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ec2-large-instance-create-alarm</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ec2-should-have-a-name-set</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ec2-with-admin-access</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ec2-with-gpu-capabilities</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ec2-with-high-privileged-policies</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ecs-cluster-delete-alarm</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ecs-task-with-admin-access</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ecs-task-with-high-privileged-policies</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/eks-cluster-delete-alarm</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/elastic-ip-not-in-use</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/elasticache-cluster-delete-alarm</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/elb-not-in-use</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-access-keys-are-rotated-every-90-days-or-less</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-all-hosts-in-the-target-group-are-in-healthy-state</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-all-hosts-in-the-target-group-are-in-use</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-all-iam-users-with-console-access-have-mfa-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-amazon-mq-broker-instances-are-using-desired-instance-types</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-amazon-mq-brokers-are-not-publicly-accessible</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-amazon-mq-brokers-are-not-publicly-accessible-2</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-amazon-mq-brokers-are-using-the-active-standby-deployment-mode</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-amazon-mq-brokers-are-using-the-latest-engine-version</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-amazon-mq-brokers-auto-minor-version-upgrade-feature-is-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-amazon-mq-brokers-log-exports-feature-is-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-amazon-sagemaker-notebook-instance-is-in-vpc</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-api-gateway-has-content-encoding-feature-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-application-load-balancer-alb-has-access-logging-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-application-load-balancers-alb-are-configured-to-drop-http-headers-7</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-auto-tune-feature-is-enabled-in-opensearch-clusters</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-aws-config-is-configured-to-include-global-resources</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-aws-eks-cluster-has-secrets-encryption-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-both-vpn-tunnels-are-up</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-cloudformation-stacks-are-sending-event-notifications-to-an-sns-topic</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-cloudformation-stacks-termination-protection-feature-is-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-cloudfront-distribution-enforce-https-protocol-for-data-in-transit</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-cloudfront-distributions-use-a-security-policy-with-minimum-tlsv1-1-or-tlsv1-2</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-cloudfront-has-waf-attached</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-cloudfront-web-distributions-are-configured-to-compress-objects-files-automatically</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-cloudfront-web-distributions-enforce-field-level-encryption</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-cloudtrail-buckets-are-configured-to-use-mfa</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-cloudtrail-log-file-integrity-validation-is-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-cloudtrail-logs-are-encrypted-at-rest</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-cloudtrail-trails-have-multi-region-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-cloudtrail-trails-record-global-service-events</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-cloudwatch-logs-service-is-configured-to-monitor-cloudtrail-trail-logs</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-communication-between-cloudfront-distributions-and-their-origins-is-encrypted-using-https</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-container-is-not-privileged</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-container-liveness-probe-is-configured</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-container-readiness-probe-is-configured</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-containers-do-not-run-with-allowprivilegeescalation</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-containers-run-with-a-high-gid-to-avoid-host-conflict</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-containers-run-with-a-high-uid-to-avoid-host-conflict</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-data-stored-in-the-s3-bucket-is-securely-encrypted-at-rest</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-database-migration-service-dms-are-not-publicly-accessible</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-database-migration-service-dms-replication-instances-are-using-multi-az-deployment-configurations</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-database-migration-service-dms-replication-instances-have-auto-minor-version-upgrade-feature-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-default-security-groups-are-not-in-use-by-alb</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-default-security-groups-are-not-in-use-by-ec2</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-default-security-groups-are-not-in-use-by-ecs</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-default-security-groups-are-not-in-use-by-elasticache</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-default-security-groups-are-not-in-use-by-elb</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-default-security-groups-are-not-in-use-by-lambda</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-default-security-groups-are-not-in-use-by-msk</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-default-security-groups-are-not-in-use-by-opensearch</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-default-security-groups-are-not-in-use-by-rds</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-default-security-groups-are-not-in-use-by-vpc-endpoints</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-default-security-groups-do-not-allow-unrestricted-traffic</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-default-service-accounts-are-not-actively-used</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-dms-instances-are-not-accessible-via-internet-network-and-api</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-documentdb-clusters-have-log-exports-feature-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-documentdb-database-clusters-have-a-minimum-backup-retention-period</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-documentdb-database-instances-are-not-accessible-via-internet-network-and-api</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-documentdb-database-instances-have-storage-encryption-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-documentdb-volumes-are-of-type-gp3-general-purpose-ssd-instead-of-gp2</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-dynamodb-tables-are-encrypted-with-customer-managed-key</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-dynamodb-tables-have-point-in-time-recovery-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-each-container-has-a-configured-cpu-limit</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-each-container-has-a-configured-cpu-request</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-each-container-has-a-configured-memory-limit</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-each-container-has-a-configured-memory-request</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-each-container-image-has-a-pinned-tag-version</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-each-ecs-container-image-has-a-pinned-tag-version</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-ebs-snapshots-are-encrypted</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-ebs-snapshots-are-not-publicly-accessible</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-ebs-volumes-are-encrypted</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-ebs-volumes-are-of-type-gp3-general-purpose-ssd-instead-of-gp2</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-ebs-volumes-are-of-type-gp3-general-purpose-ssd-instead-of-io1</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-ec2-amis-are-not-publicly-accessible</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-ec2-instance-uses-an-iam-profile</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-ec2-instances-use-instance-metadata-service-version-2-imdsv2</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-ecs-task-definition-has-memory-limit</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-efs-file-systems-are-encrypted</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-efs-file-systems-are-encrypted-using-kms-cmk-customer-managed-keys</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-eks-private-access-is-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-eks-public-access-is-disabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-eks-public-access-is-restricted-to-specific-sources</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-elasticache-redis-clusters-are-encrypted-at-rest</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-elasticache-redis-clusters-are-encrypted-in-transit</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-elasticache-redis-clusters-have-automatic-backup-turned-on</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-emr-cluster-archive-log-files-to-s3</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-emr-cluster-master-nodes-are-not-publicly-accessible</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-emr-clusters-are-encrypted-in-transit-and-at-rest</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-geo-restriction-is-enabled-within-cloudfront-distribution</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-iam-group-has-no-inline-policy</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-iam-password-policy-expires-passwords-within-90-days-or-less</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-iam-password-policy-has-expiration-period</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-iam-password-policy-prevents-password-reuse</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-iam-password-policy-require-at-least-one-lowercase-letter</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-iam-password-policy-require-at-least-one-number</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-iam-password-policy-require-at-least-one-symbol</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-iam-password-policy-requires-at-least-one-uppercase-letter</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-iam-password-policy-requires-minimum-length-of-14-or-greater</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-iam-policies-that-allow-full-administrative-privileges-are-not-created</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-iam-policies-that-allow-over-privileges-access-to-data-are-not-created</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-iam-role-has-no-inline-policy</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-iam-user-has-no-inline-policy</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-iam-users-are-members-of-at-least-one-iam-group</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-iam-users-receive-permissions-only-through-groups</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-ingress-does-not-use-unsafe-annotations</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-internet-exposed-albs-have-waf-attached</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-internet-gateway-is-attached-to-a-vpc</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-kinesis-data-stream-encryption-is-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-kubernetes-api-servers-are-not-publicly-accessible</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-kubernetes-service-is-not-using-an-external-ip</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-lambda-environment-variables-are-encrypted-using-customer-managed-customer-master-keys-cmks</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-lambda-environment-variables-are-using-customer-managed-customer-master-keys</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-lambda-function-is-configured-to-use-a-dead-letter-queue-dlq</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-lambda-function-resource-based-policy-does-not-allow-public-access</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-lambda-functions-prohibit-public-access</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-launch-wizard-security-groups-are-not-in-use-by-ec2</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-msk-kafka-broker-instances-are-not-publicly-accessible</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-msk-kafka-cluster-is-not-using-an-unsupported-kafka-version-2-4-1</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-msk-kafka-clusters-have-encryption-in-transit-enabled-between-brokers-within-a-cluster</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-msk-kafka-clusters-have-encryption-in-transit-enabled-between-clients-and-brokers-using-tls</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-no-root-account-access-key-exists</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-node-to-node-encryption-is-enabled-for-opensearch-clusters</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-on-premises-internal-network-connected-to-direct-connect-is-not-publicly-accessible-via-ec2-instance</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-on-premises-internal-network-connected-to-direct-connect-is-not-publicly-accessible-via-rds</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-opensearch-clusters-are-using-dedicated-master-nodes</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-opensearch-data-at-rest-encryption-is-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-opensearch-domains-are-configured-to-enforce-https-connections</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-opensearch-domains-are-in-a-vpc</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-opensearch-has-at-least-3-dedicated-master-nodes</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-opensearch-instances-are-spread-across-multi-az-in-production</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-opensearch-nodes-are-using-general-purpose-ssd-storage</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-opensearch-service-domain-advancedsecurityoptions-are-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-pods-are-not-deployed-in-the-default-namespace</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-rds-database-instances-are-not-accessible-via-internet-network-and-api</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-rds-database-instances-are-not-publicly-accessible</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-rds-database-instances-have-copy-tags-to-snapshots-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-rds-database-instances-have-deletion-protection-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-rds-database-instances-have-storage-encryption-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-rds-instances-are-configured-with-auto-minor-version-upgrade</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-rds-instances-are-using-general-purpose-ssd-storage-and-not-provisioned-iops-ssd-storage</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-rds-instances-have-backup-policy</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-rds-instances-have-iam-database-authentication-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-rds-instances-have-multi-az-disabled-in-dev-environments</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-rds-instances-have-multi-az-enabled-in-production</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-rds-instances-have-performance-insights-feature-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-rds-instances-have-storage-autoscaling-feature-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-rds-is-not-using-the-default-port-1433</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-rds-is-not-using-the-default-port-1521</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-rds-is-not-using-the-default-port-3306</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-rds-is-not-using-the-default-port-5432</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-rds-mysql-and-postgresql-database-instances-have-performance-insights-feature-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-redshift-clusters-are-encrypted-at-rest</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-redshift-clusters-are-not-publicly-accessible</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-redshift-clusters-are-not-using-default-endpoint-port</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-redshift-clusters-are-provisioned-within-a-vpc</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-redshift-clusters-are-using-a-custom-master-user-name-instead-of-the-default-master-user-name</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-redshift-clusters-are-using-desired-node-types</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-redshift-clusters-are-using-the-latest-generation-of-nodes</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-redshift-clusters-automated-snapshot-retention-period-is-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-redshift-clusters-deferred-maintenance-feature-is-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-redshift-clusters-enhanced-vpc-routing-feature-is-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-redshift-clusters-nodes-has-not-reached-the-limit-quota-established-by-your-organization</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-redshift-clusters-version-upgrade-feature-is-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-redshift-is-not-accessible-via-internet</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-root-user-has-mfa-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-s3-bucket-access-logging-is-enabled-on-the-cloudtrail-s3-bucket</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-s3-buckets-associated-with-cloudtrail-trails-are-configured-with-sever-access-logging</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-s3-buckets-for-cloudtrail-logs-are-encrypted-at-rest</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-s3-buckets-have-server-access-logging-enabled-to-track-access-requests</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-s3-object-versioning-is-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-sagemaker-notebook-data-is-encrypted</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-sagemaker-notebook-direct-internet-access-is-disabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-security-groups-do-not-have-all-ports-open</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-security-groups-do-not-have-ingress-open-to-any-0-0-0-0-0</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-service-account-tokens-are-only-mounted-where-necessary</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-simple-email-service-ses-has-dkim-feature-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-simple-email-service-ses-identities-are-not-exposed</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-simple-email-service-ses-identities-are-verified</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-sns-encryption-is-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-sns-is-not-publicly-accessible</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-sqs-encryption-is-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-sqs-is-not-publicly-accessible</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-stopped-documentdb-instances-are-removed</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-stopped-ec2-instances-are-removed</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-stopped-rds-instances-are-removed</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-subnets-do-not-assign-public-ip-by-default</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-targets-groups-use-health-checks</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-that-cloudfront-distribution-is-not-using-insecure-ssl-protocols</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-that-eks-security-groups-are-configured-to-allow-incoming-traffic-only-on-tcp-port-443</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-that-origin-failover-feature-is-enabled-for-cloudfront-web-distributions</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-that-s3-buckets-are-configured-with-block-public-access</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-that-s3-buckets-associated-with-cloudtrail-trails-have-object-lock-feature-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-that-s3-buckets-have-object-lock-feature-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-that-the-vpc-endpoint-state-is-available</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-the-s3-bucket-for-cloudtrail-logs-is-not-publicly-accessible</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-are-no-auto-scaling-groups-with-suspended-processes</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-are-no-ebs-snapshots-older-than-a-month</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-disabled-kms-key</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-all-tcp-ports</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-10250-kubelet-api</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-10257-kube-controller-manager</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-10259-kube-scheduler</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-11211-memcached</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-11215-memchaced-ssl</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-135-rpc</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-137-netbios</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-139-netbios</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-1433-mssql</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-1434-mssql</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-1521-oracledb</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-20-ftp</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-21-ftp</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-2181-zookeeper</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-22-ssh</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-23-telnet</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-2375-docker</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-2376-docker</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-2379-etcd</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-2380-etcd</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-2382-sql</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-2383-sql-server-analysis</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-2484-oracle-db-ssl</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-25-smtp</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-27017-mongodb</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-27018-mongodb</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-27019-mongodb</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-2888-zookeeper</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-3020-smb-cifs</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-3306-mysql</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-3389-rdp</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-4333-msql</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-445-smb</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-4505-salt</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-4506-salt</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-5005-neo4j</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-53-dns</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-5432-postgresql</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-5500-vnc-listener</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-5601-kibana</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-5900-vnc-server</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-5984-couchdb</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-61620-opscenter</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-61621-cassandra</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-6379-redis</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-6443-kubernetes-api-server</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-7000-cassandra-internode</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-7473-neo4j</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-7474-neo4j</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-80-http</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-8000-http</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-8020-hadoop</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-8080-http-proxy</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-8300-8301-8302-consul</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-8888-cassandra</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-9090-prometheus</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-9092-kafka</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-9093-prometheus</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-9200-elasticsearch</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-tcp-port-9300-elasticsearch</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-udp-port-11211-memcached</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-udp-port-53-dns</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-there-is-no-unrestricted-inbound-access-to-udp-port-69-tftp</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-transit-gateway-auto-accept-shared-attachments-is-disabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-transit-gateway-vpc-associations-and-propagations-are-disabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-vpc-endpoint-policy-doesnt-allow-all-actions</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-vpc-flow-logging-is-enabled-in-all-vpcs</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-vpc-peering-dns-resolution-is-enabled</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-waf-has-associated-rules-or-rule-group</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-waf-rule-group-is-not-empty</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/ensure-zone-awareness-is-enabled-for-opensearch-clusters</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/forbidden-container-registries</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/gateway-vpc-endpoint-is-not-in-use</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/iam-group-allows-inline-admin-access</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/iam-group-inline-policy-is-over-permissive</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/iam-policy-changes-alarm</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/iam-role-inline-policy-has-over-permissive-dynamodb-access</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/iam-role-inline-policy-has-over-permissive-elasticache-access</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/iam-role-inline-policy-has-over-permissive-kafka-access</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/iam-role-inline-policy-has-over-permissive-kms-access</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/iam-role-inline-policy-has-over-permissive-opensearch-access</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/iam-role-inline-policy-has-over-permissive-rds-access</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/iam-role-inline-policy-has-over-permissive-s3-access</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/iam-role-inline-policy-is-over-permissive-7</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/iam-role-with-admin-access</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/iam-role-with-inline-admin-access</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/iam-user-can-execute-a-privilege-escalation-by-using-assumerole</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/iam-user-can-execute-a-privilege-escalation-by-using-attachrolepolicy</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/iam-user-can-execute-a-privilege-escalation-by-using-attachuserpolicy</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/iam-user-can-execute-a-privilege-escalation-by-using-createpolicyversion</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/iam-user-can-execute-a-privilege-escalation-by-using-inline-assumerole</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/iam-user-can-execute-a-privilege-escalation-by-using-inline-attachrolepolicy</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/iam-user-can-execute-a-privilege-escalation-by-using-inline-attachuserpolicy</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/iam-user-can-execute-a-privilege-escalation-by-using-inline-createpolicyversion</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/iam-user-can-execute-a-privilege-escalation-by-using-inline-passrole</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/iam-user-can-execute-a-privilege-escalation-by-using-inline-updateloginprofile</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/iam-user-can-execute-a-privilege-escalation-by-using-passrole</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/iam-user-can-execute-a-privilege-escalation-by-using-passrole-and-createfunction-and-lambda-invokefunction</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/iam-user-can-execute-a-privilege-escalation-by-using-passrole-and-createpipeline-and-putpipelinedefinition</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/iam-user-can-execute-a-privilege-escalation-by-using-passrole-and-runinstances</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/iam-user-can-execute-a-privilege-escalation-by-using-updateassumerolepolicy-and-sts-assumerole</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/iam-user-can-execute-a-privilege-escalation-by-using-updateloginprofile</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/iam-user-inline-policy-is-over-permissive</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/iam-user-with-admin-access</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/iam-user-with-admin-access-5</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/iam-user-with-high-privileged-policies</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/iam-user-with-inline-admin-access</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/internet-gateway-igw-changes-alarm</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/lambda-admin-access</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/lambda-functions-should-be-in-a-vpc</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/lambda-with-high-privileged-policies</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/nat-gateway-changes-alarm</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/network-acl-nacl-changes-alarm</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/new-iam-user-is-created</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/opensearch-domain-delete-alarm</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/outbound-network-traffic-to-known-tor-domains</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/pod-in-failed-state</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/pod-is-internet-facing-via-alb-and-does-not-have-cpu-mem-limits</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/pod-is-internet-facing-via-elb-and-does-not-have-cpu-mem-limits</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/pod-is-internet-facing-via-nlb-and-does-not-have-cpu-mem-limits</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/pod-with-admin-access</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/pod-with-high-privileged-policies</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/prevent-ingress-from-forwarding-all-traffic-to-a-single-container</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/prevent-service-from-exposing-node-port</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/rds-database-delete-alarm</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/resource-has-access-to-get-data-from-s3-bucket</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/resource-is-internet-facing</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/resource-is-internet-facing-via-alb</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/resource-is-internet-facing-via-elb</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/resource-is-internet-facing-via-nlb</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/resource-with-over-permissive-dynamodb-getitem-permissions</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/resource-with-over-permissive-dynamodb-getitem-permissions-via-iam-group-inline</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/resource-with-over-permissive-dynamodb-getitem-permissions-via-iam-role-inline</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/resource-with-over-permissive-elasticache-permissions</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/resource-with-over-permissive-elasticache-permissions-via-iam-role-inline</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/resource-with-over-permissive-kms-permissions</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/resource-with-over-permissive-kms-permissions-via-iam-role-inline</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/resource-with-over-permissive-opensearch-permissions</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/resource-with-over-permissive-opensearch-permissions-via-iam-role-inline</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/resource-with-over-permissive-rds-permissions</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/resource-with-over-permissive-rds-permissions-via-iam-role-inline</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/resource-with-over-permissive-s3-getobject-permissions</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/resource-with-over-permissive-s3-getobject-permissions-via-iam-group-inline</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/resource-with-over-permissive-s3-getobject-permissions-via-iam-role-inline</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/route-table-changes-alarm</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/s3-bucket-changes-alarm</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/s3-bucket-is-public</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/s3-inline-policy-is-over-permissive</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/security-group-sg-changes-alarm</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/sns-inline-policy-is-over-permissive</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/sqs-inline-policy-is-over-permissive</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/suspicious-imds-access-from-kubernetes-pod</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/target-group-is-in-use-by-lb-without-any-active-targets</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/transit-gateway-tgw-changes-alarm</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/unused-nat-resources</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/use-read-only-filesystem-for-containers-where-possible</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/vpc-changes-alarm</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/vpc-endpoint-is-publicly-accessible</loc>
    </url>
    <url>
        <loc>https://www.stream.security/rules/vpc-peering-changes-alarm</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/2024-americas-spring-summit</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/4d-security-lunch-learn</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/4d-security-lunch-learn-73a57</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/alacrinet-west-point-s-ultimate-fall-foliage-cruise-tailgate-with-a-live-band</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/aws-re-inforce-2025</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/aws-re-inforce-us-24---booth</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/aws-re-invent-24</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/aws-reinforce-2025</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/aws-reinforce-24</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/aws-reinvent-24-vegas</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/aws-summit-emea-2024</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/aws-summit-emea-2024-260cc</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/bintec</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/bintec-92f10</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/black-hat-europe-2024</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/black-hat-usa-2024</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/blackhat-2025</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/blackhat-2025-5fd75</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/blackhat-eu</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/blackhat-us-24</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/boston-cybersecurity-summit</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/bourbon-and-blazers-cyber-risk-partners</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/c-vision-la</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/c-vision-the-future-of-it-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/christmas-dinner-with-oh-ffs</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/cio-golf-outing</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/ciso-360-nyc</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/ciso-atl-summit</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/ciso-atl-summit---norcal-cdm-media</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/ciso-rountable---cyberrisk-partners</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/ciso-summit-norcal</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/cloud-and-security-expo-uk</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/csa-atlanta</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/csa-atlanta-bourbon-blazers</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/cyber-leaders-london</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/cyber-security-summit-atlanta</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/cyber-security-summit-nyc</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/cybersecureforum</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/cybersecurity-summit-atlanta</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/cybersecurity-summit-atlanta-18f63</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/cybersecurity-summit-chicago</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/cybersecurity-summit-chicago-6c4db</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/cybersecurity-summit-chicago-84632</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/cybersecurity-summit-san-diego</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/defy-security-networking-in-neverland</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/defy-security-networking-in-neverland-af38d</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/defy-sko-2025</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/dtx---miami-leadership-summit</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/dtx---miami-leadership-summit-1c786</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/dtx-cyber-leaders-summit---financial-services</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/eip-cybersecurity-roundtable---lp-meeting</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/eip-cybersecurity-roundtable---lp-meeting-03d9a</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/fs-isac-americas-spring-summit</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/future-of-cybersecurity-europe</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/futurecon-baltimore</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/futurecon-boston</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/futurecon-chicago</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/futurecon-chicago-4390d</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/futurecon-columbus</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/futurecon-philadelphia</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/gartner-security-risk-management</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/gartner-security-risk-management-3899c</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/gbi-ciso-boston</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/gbi-ciso-boston-51ee1</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/gbi-ciso-chicago</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/gbi-ciso-chicago-20774</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/gbi-ciso-event-london-summit</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/gbi-ciso-event-london-summit-cd773</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/gbi-ciso-philadelphia</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/gbi-ciso-philadelphia-430ce</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/gds-security-insight-north-america</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/gds-security-insight-north-america-0c564</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/gds-security-insight-north-america-95013</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/gds-security-insight-summit</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/gp-sec-raleigh</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/gpsec-cybersecurity-conference</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/gpsec-guidepoint-cybersecurity-conference-dallas</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/gpsec-kc</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/grit-event-dinner</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/grit-event-dinner---feb-27</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/grit-event-dinner---feb-27-324c3</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/guidepoint-csa-sponsorship</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/guidepoint-dallas-golf-tournament</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/guidepoint-dinner---one-main-finacial-team-omnicom</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/guidepoint-mn-wild-game</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/guidepoint-tysons</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/houseccon</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/houseccon-57ea5</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/houseccon-e459d</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/ians-information-security-forum-nyc</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/ians-information-security-forum-nyc-8ce17</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/infosec-europe</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/infosec-europe-5abdf</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/infosec-london---booth</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/infosecurity-europe</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/ismg-webinar</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/miami-ciso-dinner</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/miami-dolphins-tailgate-experience-with-publix</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/new-event</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/new-event-7916d</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/new-event-a68b1</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/new-event-b1984</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/new-event-bfe13</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/new-event-f4458</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/nexus-2025-glilot-roadshow</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/nfl-holiday-party</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/oh-ffs</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/partner-event-with-grit-security</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/partner-event-with-grit-security-0e34e</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/partner-event-with-grit-security-6fb12</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/partner-event-with-grit-security-9ef76</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/partner-event-with-grit-security-a3a6f</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/partner-event-with-onst-technologies</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/partner-event-with-onst-technologies-0baa3</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/philadelphia-cybersecurity-summit</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/philadelphia-cybersecurity-summit-6ac79</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/phishapalooza-mn-w-guidepoint</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/raleigh-issa-chapter-meeting</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/raleigh-issa-chapter-meeting-f3307</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/rethink-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/rsa</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/rsa-confrance</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/rsac-2025</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/s4</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/san-diego-cybersecurity-summit</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/san-diego-cybersecurity-summit-e90ae</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/sans-dfir</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/sans-dfir-summit-training-2025</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/sector</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/sector---toronto</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/sector---toronto-299ae</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/sector-bbb71</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/secure-miami</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/secure-miami-f5ffa</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/secure360-minnesota</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/secure360-minnesota-255ba</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/secureworld</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/secureworld-nyc-ciso-conference</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/smartbrief-webinar</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/southeast-cybersecurity-summit</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/tech-show-london-2024</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/tech-show-london-2024-775a8</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/the-rsa-conference-2024</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/topgolf-with-globaldots</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/triangle-infosecon-2024-issa</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/tulsa-oklahoma-it-symposium</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/uk-cyber-week-24</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/uk-cyber-week-24-07697</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/webinar-actual-tech-bringing-cloud-context-to-secops</loc>
    </url>
    <url>
        <loc>https://www.stream.security/conferences/webinar-isaca</loc>
    </url>
    <url>
        <loc>https://www.stream.security/cloud-providers/aws</loc>
    </url>
    <url>
        <loc>https://www.stream.security/cloud-providers/azure</loc>
    </url>
    <url>
        <loc>https://www.stream.security/cloud-providers/kubernetes</loc>
    </url>
    <url>
        <loc>https://www.stream.security/tags-blog/ai-soc</loc>
    </url>
    <url>
        <loc>https://www.stream.security/tags-blog/atlantis</loc>
    </url>
    <url>
        <loc>https://www.stream.security/tags-blog/aws</loc>
    </url>
    <url>
        <loc>https://www.stream.security/tags-blog/cdr</loc>
    </url>
    <url>
        <loc>https://www.stream.security/tags-blog/cloudtwin</loc>
    </url>
    <url>
        <loc>https://www.stream.security/tags-blog/cnapp</loc>
    </url>
    <url>
        <loc>https://www.stream.security/tags-blog/compliance</loc>
    </url>
    <url>
        <loc>https://www.stream.security/tags-blog/compute</loc>
    </url>
    <url>
        <loc>https://www.stream.security/tags-blog/costoptimization</loc>
    </url>
    <url>
        <loc>https://www.stream.security/tags-blog/data-security</loc>
    </url>
    <url>
        <loc>https://www.stream.security/tags-blog/disaster-recovery</loc>
    </url>
    <url>
        <loc>https://www.stream.security/tags-blog/dspm</loc>
    </url>
    <url>
        <loc>https://www.stream.security/tags-blog/edr</loc>
    </url>
    <url>
        <loc>https://www.stream.security/tags-blog/flowlogs</loc>
    </url>
    <url>
        <loc>https://www.stream.security/tags-blog/gartner</loc>
    </url>
    <url>
        <loc>https://www.stream.security/tags-blog/github</loc>
    </url>
    <url>
        <loc>https://www.stream.security/tags-blog/idp</loc>
    </url>
    <url>
        <loc>https://www.stream.security/tags-blog/kubernetes</loc>
    </url>
    <url>
        <loc>https://www.stream.security/tags-blog/networking</loc>
    </url>
    <url>
        <loc>https://www.stream.security/tags-blog/permissions</loc>
    </url>
    <url>
        <loc>https://www.stream.security/tags-blog/re-invent</loc>
    </url>
    <url>
        <loc>https://www.stream.security/tags-blog/reliability</loc>
    </url>
    <url>
        <loc>https://www.stream.security/tags-blog/resilience</loc>
    </url>
    <url>
        <loc>https://www.stream.security/tags-blog/secrets</loc>
    </url>
    <url>
        <loc>https://www.stream.security/tags-blog/shift-left</loc>
    </url>
    <url>
        <loc>https://www.stream.security/tags-blog/siem</loc>
    </url>
    <url>
        <loc>https://www.stream.security/tags-blog/soar</loc>
    </url>
    <url>
        <loc>https://www.stream.security/tags-blog/stream-traps</loc>
    </url>
    <url>
        <loc>https://www.stream.security/tags-blog/sustainability</loc>
    </url>
    <url>
        <loc>https://www.stream.security/tags-blog/terraform</loc>
    </url>
    <url>
        <loc>https://www.stream.security/tags-blog/troubleshooting</loc>
    </url>
    <url>
        <loc>https://www.stream.security/tags-blog/xdr</loc>
    </url>
    <url>
        <loc>https://www.stream.security/blog-category/ai</loc>
    </url>
    <url>
        <loc>https://www.stream.security/blog-category/ai-detection-response</loc>
    </url>
    <url>
        <loc>https://www.stream.security/blog-category/availability</loc>
    </url>
    <url>
        <loc>https://www.stream.security/blog-category/cloud-detection-response</loc>
    </url>
    <url>
        <loc>https://www.stream.security/blog-category/cost</loc>
    </url>
    <url>
        <loc>https://www.stream.security/blog-category/product</loc>
    </url>
    <url>
        <loc>https://www.stream.security/blog-category/security</loc>
    </url>
    <url>
        <loc>https://www.stream.security/blog-category/terraform-iac</loc>
    </url>
    <url>
        <loc>https://www.stream.security/alternative-to/aqua-security</loc>
    </url>
    <url>
        <loc>https://www.stream.security/alternative-to/crowdstrike-falcon-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.stream.security/alternative-to/datadog</loc>
    </url>
    <url>
        <loc>https://www.stream.security/alternative-to/palo-alto-cortex-cloud</loc>
    </url>
    <url>
        <loc>https://www.stream.security/alternative-to/sysdig</loc>
    </url>
    <url>
        <loc>https://www.stream.security/alternative-to/wizdefend</loc>
    </url>
    <url>
        <loc>https://www.stream.security/events/aws-re-invent-technology-leaders-breakfast-with-skyward-connect-and-stream-security</loc>
    </url>
    <url>
        <loc>https://www.stream.security/events/clearscale-and-stream-security-exclusive-dinner-event</loc>
    </url>
    <url>
        <loc>https://www.stream.security/events/denver-dine-dash-happy-hour-at-post-oak</loc>
    </url>
    <url>
        <loc>https://www.stream.security/events/exclusive-ciso-dinner-the-future-of-cloud-security---detection-response-in-a-breach-prone-world</loc>
    </url>
    <url>
        <loc>https://www.stream.security/events/executive-networking-forum-the-future-of-cloud-detection-and-response-in-an-ai-driven-threat-landscape</loc>
    </url>
    <url>
        <loc>https://www.stream.security/events/guidepoint-dallas-golf-tournament</loc>
    </url>
    <url>
        <loc>https://www.stream.security/events/its-christmas-with-oh-ffs</loc>
    </url>
    <url>
        <loc>https://www.stream.security/events/publix-ultimate-tailgate-party-and-baltimore-ravens-v-miami-dolphins-game</loc>
    </url>
    <url>
        <loc>https://www.stream.security/events/uk-cyber-week-dinner</loc>
    </url>
    <url>
        <loc>https://www.stream.security/lp/aws-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.stream.security/lp/aws-config</loc>
    </url>
    <url>
        <loc>https://www.stream.security/lp/aws-guardduty</loc>
    </url>
    <url>
        <loc>https://www.stream.security/lp/azure-security</loc>
    </url>
    <url>
        <loc>https://www.stream.security/lp/cloud-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.stream.security/lp/cnapp-security</loc>
    </url>
    <url>
        <loc>https://www.stream.security/lp/cnapp-vs-cspm</loc>
    </url>
    <url>
        <loc>https://www.stream.security/lp/container-security</loc>
    </url>
    <url>
        <loc>https://www.stream.security/lp/cspm-tools</loc>
    </url>
    <url>
        <loc>https://www.stream.security/lp/kspm-tool</loc>
    </url>
    <url>
        <loc>https://www.stream.security/lp/ndr</loc>
    </url>
    <url>
        <loc>https://www.stream.security/glossary/beyond-the-booth-why-cybersecurity-needs-more-imagination-copy-copy-copy</loc>
    </url>
    <url>
        <loc>https://www.stream.security/glossary/beyond-the-booth-why-cybersecurity-needs-more-imagination-copy-copy-copy-2c35d</loc>
    </url>
    <url>
        <loc>https://www.stream.security/glossary/beyond-the-booth-why-cybersecurity-needs-more-imagination-copy-copy-copy-4c81a</loc>
    </url>
    <url>
        <loc>https://www.stream.security/glossary/test-item</loc>
    </url>
    <url>
        <loc>https://www.stream.security/glossary/test-item-62ce9</loc>
    </url>
    <url>
        <loc>https://www.stream.security/glossary/what-is-a-cloud-native-application-protection-platform-cnapp</loc>
    </url>
    <url>
        <loc>https://www.stream.security/glossary/wizdefend</loc>
    </url>
    <url>
        <loc>https://www.stream.security/webinar/building-an-adaptive-cyber-resilient-cloud-aug-2024</loc>
    </url>
    <url>
        <loc>https://www.stream.security/webinar/cloudy-with-a-chance-of-ransomware-building-adaptive-resilience-to-weather-the-storm</loc>
    </url>
    <url>
        <loc>https://www.stream.security/webinar/filling-the-void-in-secops-tools-with-cloud-context</loc>
    </url>
    <url>
        <loc>https://www.stream.security/webinar/latio-tech-workshop-what-it-takes-to-respond-to-cloud-incidents</loc>
    </url>
    <url>
        <loc>https://www.stream.security/webinar/may-the-force-be-with-you-webinar</loc>
    </url>
    <url>
        <loc>https://www.stream.security/webinar/putting-the-r-in-cdr-balancing-speed-and-control-in-cloud-incident-response-sans-dfir-summit</loc>
    </url>
    <url>
        <loc>https://www.stream.security/webinar/threat-response-in-the-cloud-balancing-between-speed-and-control</loc>
    </url>
    <url>
        <loc>https://www.stream.security/webinar/turning-the-tables-on-threat-actors-how-to-detect-and-delay-attacks-using-cloud-traps</loc>
    </url>
    <url>
        <loc>https://www.stream.security/webinar/why-cloud-detection-and-response-cdr-demands-a-new-security-paradigm</loc>
    </url>
    <url>
        <loc>https://www.stream.security/webinar/you-cant-prompt-your-way-out-of-bad-data-why-context-not-models-wins-in-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.stream.security/press/clearscale-and-stream-security-forge-strategic-partnership-for-continuous-real-time-monitoring-in-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.stream.security/press/crowdstrike-and-stream-security-full-spectrum-threat-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.stream.security/press/series-a</loc>
    </url>
    <url>
        <loc>https://www.stream.security/press/soc-2</loc>
    </url>
    <url>
        <loc>https://www.stream.security/press/stream-security-and-cyera-join-forces-to-strengthen-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.stream.security/press/stream-security-appoints-art-durivage-as-senior-vice-president-of-global-sales-to-accelerate-global-expansion</loc>
    </url>
    <url>
        <loc>https://www.stream.security/press/stream-security-appoints-patrick-guay-chief-revenue-officer</loc>
    </url>
    <url>
        <loc>https://www.stream.security/press/stream-security-automates-cloud-incident-response-with-guided-runbooks</loc>
    </url>
    <url>
        <loc>https://www.stream.security/press/stream-security-expands-into-cloudsecops-market-with-launch-of-real-time-cloud-security-solution</loc>
    </url>
    <url>
        <loc>https://www.stream.security/press/stream-security-extends-industrys-only-real-time-cloud-detection-response-solution-with-trap-technology-designed-to-proactively-mitigate-breach-impact-in-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.stream.security/press/stream-security-launches-google-chrome-extension</loc>
    </url>
    <url>
        <loc>https://www.stream.security/press/stream-security-launches-streamline-integration-program-to-enhance-roi-from-existing-security-technologies</loc>
    </url>
    <url>
        <loc>https://www.stream.security/press/stream-security-named-a-cool-vendor-for-the-modern-security-operations-center-by-gartner</loc>
    </url>
    <url>
        <loc>https://www.stream.security/press/stream-security-releases-suite-of-next-gen-features</loc>
    </url>
    <url>
        <loc>https://www.stream.security/press/stream-security-secures-30-million-in-series-b-funding</loc>
    </url>
    <url>
        <loc>https://www.stream.security/press/stream-security-wins-cloud-detection-and-response-platform-of-the-year-in-2025-cybersecurity-breakthrough-awards</loc>
    </url>
    <url>
        <loc>https://www.stream.security/press/stream-security-wins-trailblazing-cloud-detection-response-award-at-the-2025-top-infosec-innovator-awards</loc>
    </url>
    <url>
        <loc>https://www.stream.security/videos/you-cant-prompt-your-way-out-of-bad-data-why-context-not-models-wins-in-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.stream.security/content-categories/case-studies</loc>
    </url>
    <url>
        <loc>https://www.stream.security/content-categories/datasheets</loc>
    </url>
    <url>
        <loc>https://www.stream.security/content-categories/reports</loc>
    </url>
    <url>
        <loc>https://www.stream.security/content/5-reasons-to-deploy-trap</loc>
    </url>
    <url>
        <loc>https://www.stream.security/content/case-study-hibob</loc>
    </url>
    <url>
        <loc>https://www.stream.security/content/cdr-essentials-a-guide-for-overwhelmed-cloud-teams</loc>
    </url>
    <url>
        <loc>https://www.stream.security/content/closing-the-cloud-security-gap</loc>
    </url>
    <url>
        <loc>https://www.stream.security/content/enhancing-siem-with-real-time-cloud-context</loc>
    </url>
    <url>
        <loc>https://www.stream.security/content/gartner-emerging-tech-innovators-report-2025</loc>
    </url>
    <url>
        <loc>https://www.stream.security/content/how-shield-transformed-its-security-strategy-with-cloud-detection-and-response-for-real-time-protection</loc>
    </url>
    <url>
        <loc>https://www.stream.security/content/real-time-cnapp</loc>
    </url>
    <url>
        <loc>https://www.stream.security/content/stream-security-recognized-in-gartner-r-2025-innovation-insight-ai-soc-agents-report</loc>
    </url>
    <url>
        <loc>https://www.stream.security/content/the-cloud-secops-paradox-why-security-operations-teams-escalate-too-much-and-catch-too-little-in-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.stream.security/content/the-cloud-twin-case-study</loc>
    </url>
    <url>
        <loc>https://www.stream.security/content/the-top-5-challenges-for-secops-teams</loc>
    </url>
    <url>
        <loc>https://www.stream.security/content/traditional-security-tools-fail-in-the-cloud-cdr-is-closing-that-gap</loc>
    </url>
</urlset>